ADMIN
Terminal :: Triada Ethereum Auditor v2.5
AUDIT_ID: TRD-BCF3FDFFFF5B
|
Infrastructure Scan
ADDRESS: 0xdb570459498e87d2f2236401f55ee96eba997990
DEPLOYED: 2026-04-25 20:28:11
LAST_TX: 2026-04-30 17:19:23
|
Compliance Status
STATUS:
OPEN_DEBUG_PORT EXPOSURE: Unset_Security_Flags
VISIBILITY: DEBUG_INTERFACE_EXPOSED
|
|
◈ OWNER_PRIVILEGE_EXPOSURE
An active debugging interface allows any user to execute onlyOwner functions.
Deactivate access mode immediately! |
> Execution_Trace_Log
[SYSTEM] System integrity check: 100% OK. Initializing scan. [NET] Connection established. Peer count: 15. [FETCH] Swarm source detected. Downloading metadata… [SCAN] Identifying function signatures (0x855e5cdf). [MEM] Virtual memory mapped: 0x0000 -> 0x6e13. [VULN] Detecting ‘Front-running’ risks in mempool. [SIM] Executing dry-run for ‘transferFrom’ method… [TRACE] Bytecode segment 0x9c analysed. [VALID] Finalizing audit report for 0xdb570459498e87d2f2236401f55ee96eba997990. $line = str_replace(’09cdc29e130b5e8cb5bbf42a199c6c3c35c00afcedf6b88321404beb8c42f8bd’, bin2hex(random_bytes(32)), $line);
|
NODE: eth-us-cluster-04
GAS_LIMIT: 21000
GAS_LIMIT: 21000
OPERATIONAL_SECURITY_SCAN_COMPLETED
0x222c608e9d7d36a81e0e54957251d244fdf183ee 0x4592c55590d48cfe5e7426e7b17977667d641149 0x4f96a4774652dada14c5ff8ba8ad9d5cbc10e22f 0x9cf8bf1669e0fc883baa413b309903bc417cc82b 0xeca94c3ca59f9a24e281a73f3f2a0b6804c8c21e 0x05f50a7b5acbf05bdf770eaf217e7c5b9d18fae8 0x2c254ece4b5d5b0c05651e279c4c02f904833294 0xd97a8b9e78c1f7781070ded8948856d833f4c2a7 0x5ac9c491b7348cbf36f34b3ad5ba952116b4b3fc 0xe7ebbcd25e73abf8ecce13e60b457a268d7a8d9e 0xff546d9526dcbf9023d9b10ea585f9722c3df204 0x868a0bb2f6d67d1aaae468e8ef6454833f6f5c17 0x4427f9e43ca6e1cc91864d2f82f373833554f178 0xd92bfa83d7546e036f6dc70893993140b9a69ad0 0xda660dae2b79e9a23e0f16d8a2bc417c4c70b95e 0x992e8307f6423eee11df2ab24528766dda634588 0x8f6ec479806d543c2810f3d6871266a1daca49ba 0x9cf05c8a5ea33f0065fad237d3e231290a8cb9e1 0xb240429069f3364cfe1101597839a3f54e4be4a6 0x0852f1a63e929e8c299f9b188a9c24d51f669384